Azure Virtual Network

  • date 17th April, 2024 |
  • by Prwatech |
  • 0 Comments

Azure Virtual Network

 

  1. Your isolated network in Azure.
  2. The region can have multipleVNets but each VNetbelongs to the same Region
  3. Within a VNet, network traffic is isolated (not visible) from network traffic in all other Azure VNet.
  4. You maintain complete control over all traffic entering and leaving a VNet.
  5. IP Address is an address of resource that ensures the traffic gets to the right server on the internet
  6. Every resource gets its unique IP Address on that Vnet within the address space.
  7. Scaling – You can add more VNets or more addresses on existing VNet.
  8. Each kind of resource has distinct access requirements.
  9. Elastic Load Balancers that are publicly available are accessible through the internet (public resources)
  10. Databases and App Server instances should be inaccessible from the internet.
  11. Only apps running inside your VNet should be able to access them (private resources).
  12. How do you partition public and private resources inside a VNet?

 

Need for Azure Virtual Network

 

  1. In a corporate on-premises data center network:
    1. Nobody on the internet sees the data exchange between the application and the database.
    2. Nobody on the internet can directly connect to yourdatabase
    3. You must first establish a connection to your corporate network beforegaining access to your apps or databases.
  2. Corporate networks offer a secure internal network that safeguards yourresources, data, and communications from unauthorized access.
  3. How can you build your private cloud network?
    1. Azure Virtual Network

 

VNet Subnets

  1. Organize and group resources on subnets
  2. Separate public and private resources into distinct subnets
  3. Resources in a public subnet CAN be access from the internet
  4. Resources in a private subnet CANNOT be access from the internet, but resources in a public subnet can connect With resources in aprivate subnet.
  5. We can use network security groups to secure individual subnets
VNet Peering
  1. Connect VNets from the same or different regions (Global VNet peering)
  2. Allows for secure communication between VNets that are linked.
  3. Low Latency: Resources between differentVNets are connected using high bandwidth connections.
  4. Assemble them as though they were members of the same network
  5. Must not have CIDRs that overlap (IP address range)

 

0
0

Leave a Reply

Quick Support

image image